Select Publications
Conference Papers
2013, 'Genetic Algorithm for distorted point set matching', in Proceedings of the 2013 6th International Congress on Image and Signal Processing, CISP 2013, pp. 1724 - 1729, http://dx.doi.org/10.1109/CISP.2013.6743954
,2013, 'Cooperative multi-target tracking in passive sensor-based networks', in IEEE Wireless Communications and Networking Conference, WCNC, pp. 4340 - 4345, http://dx.doi.org/10.1109/WCNC.2013.6555276
,2013, 'Generation of a new IDS test dataset: Time to retire the KDD collection', in IEEE Wireless Communications and Networking Conference, WCNC, pp. 4487 - 4492, http://dx.doi.org/10.1109/WCNC.2013.6555301
,2013, 'A multi-module anomaly detection scheme based on system call prediction', in Proceedings of the 2013 IEEE 8th Conference on Industrial Electronics and Applications, ICIEA 2013, pp. 1376 - 1381, http://dx.doi.org/10.1109/ICIEA.2013.6566581
,2013, 'A finger-vein based cancellable bio-cryptosystem', in Lopez J; Sandhu R (ed.), Network and System Security 7th International Conference, NSS 2013 Proceedings, Madrid, Spain, pp. 784 - 790, presented at Network and System Security International Conference, Madrid, Spain, 03 June 2013 - 04 June 2013, http://dx.doi.org/10.1007/978-3-642-38631-2_71
,2012, 'High-order terminal sliding-mode observers for anomaly detection', in Lecture Notes in Computer Science, Huangshan, pp. 497 - 504, presented at 8th International Conference on Intelligent Computing Technology, ICIC 2012, Huangshan, 25 July 2012 - 29 July 2012, http://dx.doi.org/10.1007/978-3-642-31588-6_64
,2012, 'NDTC: A novel topology-based fingerprint matching algorithm using N-layer Delaunay triangulation net check', in 8th IEEE Conference on Industrial Electronics and Applications, ICIEA 2013, IEEE, IEEE, pp. 866 - 870, presented at 2012 7th IEEE Conference on Industrial Electronics and Applications, ICIEA 2012, Singapore, 18 July 2012 - 20 July 2012, http://dx.doi.org/10.1109/ICIEA.2012.6360846
,2012, 'A Delaunay triangle-based fuzzy extractor for fingerprint authentication', in Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012, IEEE, IEEE xplore, pp. 66 - 70, presented at 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012, Liverpool, UK, 25 June 2012 - 27 June 2012, http://dx.doi.org/10.1109/TrustCom.2012.23
,2012, 'A real-time Net Flow-based intrusion detection system with improved BBNN and high-frequency field programmable gate arrays', in Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012, IEEE, IEEE xplore, pp. 201 - 208, presented at 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012, Liverpool, UK, 25 June 2012 - 27 June 2012, http://dx.doi.org/10.1109/TrustCom.2012.51
,2012, 'Hashed random key pre-distribution scheme for large heterogeneous sensor networks', in Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012, IEEE, IEEE xplore, pp. 706 - 713, presented at 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012, Liverpool, UK, 25 June 2012 - 27 June 2012, http://dx.doi.org/10.1109/TrustCom.2012.171
,2012, 'Histogram-based online anomaly detection in hierarchical wireless sensor networks', in Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012, IEEE, IEEE xplore, pp. 751 - 759, presented at 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012, Liverpool, UK, 25 June 2012 - 27 June 2012, http://dx.doi.org/10.1109/TrustCom.2012.173
,2012, 'Simulatable oblivious transfer protocols based on blind signature', in Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012, IEEE, IEEE xplore, pp. 466 - 473, presented at 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012, Liverpool, UK, 25 June 2012 - 27 June 2012, http://dx.doi.org/10.1109/TrustCom.2012.263
,2011, 'Terminal sliding mode observer for anomaly detection in TCP/IP networks', in Proc. of IEEE Conference on Computer Science and Network Technology Conference, IEEE, Harbin, China, pp. 617 - 620, presented at 2011 International Conference on Computer Science and Network Technology, ICCSNT 2011, Harbin, China, 24 December 2011 - 26 December 2011
,2011, 'A bio-inspired host-based multi-engine detection system with sequential pattern recognition', in Proceedings of the 9th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2011), IEEE, Piscataway, NJ, United States, pp. 145 - 150, presented at The 9th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2011), Sydney, Australia, 12 December 2011 - 14 December 2011, http://dx.doi.org/10.1109/DASC.2011.46
,2011, 'Foreword from the conference chairs', in Proceedings - 2011 5th International Conference on Network and System Security, NSS 2011, http://dx.doi.org/10.1109/ICNSS.2011.6059949
,2011, 'On the effectiveness of relaxation theory for controlling high traffic volumes in body sensor networks', in Proceedings of the 2nd International ICST Conference on Wireless Mobile Communication and Healthcare, LNICST, Greece, pp. 210 - 213, presented at The 2nd International ICST Conference on Wireless Mobile Communication and Healthcare, Greece, 05 October 2011 - 07 October 2011
,2011, 'An alignment free fingerprint fuzzy extractor using near-equivalent Dual Layer Structure Check (NeDLSC) algorithm', in Industrial Electronics and Applications (ICIEA), IEEE, Beijing, pp. 1040 - 1045, presented at Proceedings of the 2011 6th IEEE Conference on Industrial Electronics and Applications, ICIEA 2011, Beijing, 21 June 2011 - 23 June 2011, http://dx.doi.org/10.1109/ICIEA.2011.5975740
,2011, 'Compatibility of photographed images with touch-based fingerprint verification software', in 2011 6th IEEE Conference on Industrial Electronics and Applications Proceedings, IEEE, Piscataway, NJ, USA, pp. 1034 - 1039, presented at 2011 6th IEEE Conference on Industrial Electronics and Applications, Beijing, China, 21 June 2011 - 23 June 2011, http://dx.doi.org/10.1109/ICIEA.2011.5975739
,2011, 'Pseudo random data stream generation for data/images protection in ubiquitous computing environment', in 2011 6th IEEE Conference on Industrial Electronics and Applications Proceedings, IEEE, Piscataway, NJ, USA, pp. 259 - 264, presented at 2011 6th IEEE Conference on Industrial Electronics and Applications, Beijing, China, 21 June 2011 - 23 June 2011, http://dx.doi.org/10.1109/ICIEA.2011.5975591
,2011, 'String-based cancellable fingerprint templates', in 2011 6th IEEE Conference on Industrial Electronics and Applications Proceedings, IEEE, Piscataway, NJ, USA, pp. 1028 - 1033, presented at Proceedings of the 2011 6th IEEE Conference on Industrial Electronics and Applications, ICIEA 2011, Beijing, 21 June 2011 - 23 June 2011, http://dx.doi.org/10.1109/ICIEA.2011.5975738
,2010, 'Proceedings - 2010 4th International Conference on Network and System Security, NSS 2010: Message from the NSS 2010 Program Chairs', in Proceedings - 2010 4th International Conference on Network and System Security, NSS 2010, http://dx.doi.org/10.1109/NSS.2010.5
,2010, 'A Dual-Layer Clustering Scheme for Real-Time Identification of Plagiarized Massive Multiplayer Games (MMG) Assets', in ICIEA 2010: PROCEEDINGS OF THE 5TH IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS, VOL 1, IEEE, TAIWAN, Taichung, pp. 330 - 335, presented at 5th IEEE Conference on Industrial Electronics and Applications, TAIWAN, Taichung, 15 June 2010 - 17 June 2010, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000293666000066&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,2010, 'SH 2010: Welcome message from workshop organizers: FutureTech 2010', in 2010 5th International Conference on Future Information Technology, FutureTech 2010 - Proceedings, http://dx.doi.org/10.1109/FUTURETECH.2010.5482638
,2009, 'Dual Layer Structure Check (DLSC) Fingerprint Verification Scheme Designed for Biometric Mobile Template Protection', in ICIEA: 2009 4TH IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS, VOLS 1-6, IEEE, PEOPLES R CHINA, Xian, pp. 625 - 630, presented at 4th IEEE Conference on Industrial Electronics and Applications, PEOPLES R CHINA, Xian, 25 May 2009 - 27 May 2009, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000273183200122&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,2008, 'Welcome message from the program chairs', in Proceedings - International Symposium on Computer Science and Its Applications, CSA 2008, pp. 11, http://dx.doi.org/10.1109/CSA.2008.5
,2005, 'H-infinity design for a sonar-platform', in TENCON 2005 - 2005 IEEE REGION 10 CONFERENCE, VOLS 1-5, IEEE, AUSTRALIA, Melbourne, pp. 2163 - 2168, presented at IEEE Region 10 Conference (TENCON 2005), AUSTRALIA, Melbourne, 21 November 2005 - 24 November 2005, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000246608903103&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,2005, 'Modelling of SACK TCP and application to the HTTP file transfer environment', in LCN 2005: 30TH CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, IEEE COMPUTER SOC, AUSTRALIA, Sydney, pp. 515 - 516, presented at 30th Annual IEEE Conference on Local Computer Networks, AUSTRALIA, Sydney, 15 November 2005 - 17 November 2005, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000235161300080&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,2003, 'Intrusion detection based on data mining', in ICEIS 2003 - Proceedings of the 5th International Conference on Enterprise Information Systems, pp. 341 - 346
,2003, 'Simulation study of TCP performance over mobile IPv4 and Mobile IPv6', in ICEIS 2003 - Proceedings of the 5th International Conference on Enterprise Information Systems, pp. 224 - 231
,1999, 'Adaptive real-time control of a christmas tree using a novel signal processing approach', in Proceedings of the American Control Conference, pp. 2526 - 2530
,1999, 'Investigation of signal replication techniques for road simulators: A quarter-car case study', in Proceedings of the American Control Conference, pp. 3178 - 3179
,1999, 'Practical H
1999, 'Robust adaptive equalization using the filtered-X LMS algorithm', in ISSPA 1999 - Proceedings of the 5th International Symposium on Signal Processing and Its Applications, pp. 419 - 422, http://dx.doi.org/10.1109/ISSPA.1999.818201
,1996, 'Practical approach to selecting weighting functions for H
1993, 'CONJUGATION AND H-INFINITY-CONTROL OF DISCRETE-TIME-SYSTEMS', in Yuan BZ (ed.), TENCON '93: 1993 IEEE REGION 10 CONFERENCE ON COMPUTER, COMMUNICATION, CONTROL AND POWER ENGINEERING, VOL 4, INT ACADEMIC PUBL, PEOPLES R CHINA, BEIJING, pp. 467 - 470, presented at TENCON 93 - 1993 IEEE Region 10 Conference on Computer, Communication, Control and Power Engineering, PEOPLES R CHINA, BEIJING, 19 October 1993 - 21 October 1993, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:A1993BA40V00113&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,1993, 'ROBUST PERFORMANCE CONTROL AND ANALYSIS OF ILL-CONDITIONED PLANTS', in Yuan BZ (ed.), TENCON '93: 1993 IEEE REGION 10 CONFERENCE ON COMPUTER, COMMUNICATION, CONTROL AND POWER ENGINEERING, VOL 4, INT ACADEMIC PUBL, PEOPLES R CHINA, BEIJING, pp. 238 - 240, presented at TENCON 93 - 1993 IEEE Region 10 Conference on Computer, Communication, Control and Power Engineering, PEOPLES R CHINA, BEIJING, 19 October 1993 - 21 October 1993, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:A1993BA40V00057&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,1993, 'SIMPLIFYING DISCRETE-TIME H-INFINITY CONTROL', in Yuan BZ (ed.), TENCON '93: 1993 IEEE REGION 10 CONFERENCE ON COMPUTER, COMMUNICATION, CONTROL AND POWER ENGINEERING, VOL 4, INT ACADEMIC PUBL, PEOPLES R CHINA, BEIJING, pp. 471 - 473, presented at TENCON 93 - 1993 IEEE Region 10 Conference on Computer, Communication, Control and Power Engineering, PEOPLES R CHINA, BEIJING, 19 October 1993 - 21 October 1993, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:A1993BA40V00114&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,Reports
2013, Guest editorial: Special issue on green telecommunications, http://dx.doi.org/10.1007/s11235-011-9637-7
,Preprints
2022, PowerFDNet: Deep Learning-Based Stealthy False Data Injection Attack Detection for AC-model Transmission Systems, http://dx.doi.org/10.1109/OJCS.2022.3199755
,2022, Pair-Relationship Modeling for Latent Fingerprint Recognition, http://arxiv.org/abs/2207.00587v1
,2022, FingerGAN: A Constrained Fingerprint Generation Scheme for Latent Fingerprint Enhancement, http://arxiv.org/abs/2206.12885v1
,2022, A Novel Length-Flexible Lightweight Cancelable Fingerprint Template for Privacy-Preserving Authentication Systems in Resource-Constrained IoT Applications, http://dx.doi.org/10.1109/JIOT.2022.3204246
,2021, Impact of Background Music on the Performance of Laparoscopy Teams, http://dx.doi.org/10.21203/rs.3.rs-1050433/v1
,2020, Designing constraint-based false data injection attacks against the unbalanced distribution smart grids, http://dx.doi.org/10.48550/arxiv.2003.05088
,2020, Designing False Data Injection attacks penetrating AC-based Bad Data Detection System and FDI Dataset generation, http://dx.doi.org/10.48550/arxiv.2003.05071
,2019, Online Structured Sparsity-based Moving Object Detection from Satellite Videos, http://dx.doi.org/10.48550/arxiv.1911.12989
,2019, Error Bounded Foreground and Background Modeling for Moving Object Detection in Satellite Videos, http://dx.doi.org/10.48550/arxiv.1908.09539
,2018, IriTrack: Liveness Detection Using Irises Tracking for Preventing Face Spoofing Attacks, http://dx.doi.org/10.48550/arxiv.1810.03323
,2018, Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection, http://dx.doi.org/10.48550/arxiv.1809.07912
,2017, 5-Hydroxymethylcytosine signatures in cell-free DNA provide information about tumor types and stages, http://dx.doi.org/10.1101/162081
,